Guía Para Administradores De
Total Page:16
File Type:pdf, Size:1020Kb
Guide for Network Administrators Adaptive Defense 360 Guide for Network Administrators 1 Guide for Network Administrators Table of contents PREFACE .......................................................................................................................... 9 INTRODUCTION ...............................................................................................................10 WHO IS THE GUIDE AIMED AT? ...........................................................................................10 ICONS ...........................................................................................................................10 INTRODUCTION ..............................................................................................................11 INTRODUCTION ...............................................................................................................12 KEY FEATURES OF ADAPTIVE DEFENSE 360 ............................................................................12 ADAPTIVE DEFENSE 360 USER PROFILE .................................................................................13 ADAPTIVE DEFENSE 360 ARCHITECTURE: KEY COMPONENTS .....................................................13 ADAPTIVE DEFENSE 360 CLOUD SERVER FARM ........................................................................... 14 MANAGEMENT CONSOLE WEB SERVER ..................................................................................... 15 COMPUTERS PROTECTED WITH ADAPTIVE DEFENSE 360 .............................................................. 15 ADAPTIVE DEFENSE 360 SERVICES .......................................................................................19 ADVANCED REPORTING TOOL SERVICE ...................................................................................... 19 SIEMFEEDER SERVICE: INTEGRATION WITH THE CUSTOMER’S SIEM SERVICE .................................. 19 SAMPLES FEED ...................................................................................................................... 20 IP FEEDS .............................................................................................................................. 20 REMOTE CONTROL MODULE ................................................................................................... 20 2.6 ADAPTIVE DEFENSE 360: SUPPORTED DEVICES ........................................................................20 2.7 AVAILABLE RESOURCES AND DOCUMENTATION........................................................................21 THE ADAPTIVE PROTECTION FULL CYCLE ........................................................................22 INTRODUCTION ...............................................................................................................23 THE ADAPTIVE PROTECTION CYCLE .......................................................................................23 PHASE 1: COMPLETE PROTECTION OF THE IT NETWORK ............................................................24 ANTI-EXPLOIT PROTECTION ..................................................................................................... 24 PERMANENT ANTIVIRUS PROTECTION AND COLLECTIVE INTELLIGENCE ............................................ 25 PROTECTION AGAINST ADVANCED STEALTH TECHNIQUES AND MACRO VIRUSES ................................ 25 EMAIL AND WEB PROTECTION ................................................................................................. 26 FIREWALL AND INTRUSION DETECTION SYSTEM (IDS) .................................................................. 26 DEVICE CONTROL .................................................................................................................. 26 SPAM, VIRUS AND CONTENT FILTERING FOR EXCHANGE SERVERS ................................................... 26 WEB ACCESS CONTROL ........................................................................................................... 27 PROTECTION FOR VULNERABLE SYSTEMS ................................................................................... 27 PHASE 2: DETECTION AND MONITORING ...............................................................................27 ADVANCED PERMANENT PROTECTION ....................................................................................... 28 MONITORING DATA FILES ....................................................................................................... 29 VISIBILITY OF THE NETWORK STATUS ......................................................................................... 30 PHASE 3: REMEDIATION AND RESPONSE ...............................................................................30 PHASE 4: ADAPTATION .....................................................................................................31 CREATING PANDA ACCOUNTS ........................................................................................33 INTRODUCTION ...............................................................................................................34 CREATING A PANDA ACCOUNT ...........................................................................................34 2 Guide for Network Administrators ACTIVATING YOUR PANDA ACCOUNT ...................................................................................35 THE WEB MANAGEMENT CONSOLE ................................................................................36 INTRODUCTION ...............................................................................................................37 WEB CONSOLE REQUIREMENTS ................................................................................................ 37 IDP FEDERATION ................................................................................................................... 38 GENERAL STRUCTURE OF THE WEB MANAGEMENT CONSOLE .....................................................38 TOP MENU (1) ...................................................................................................................... 38 BROWSER PATH (2) ............................................................................................................... 41 SIDE MENU (3) ..................................................................................................................... 41 TABS (4) .............................................................................................................................. 41 GENERAL SETTINGS BUTTON (5) .............................................................................................. 41 LOGGED-IN USER (6) ............................................................................................................. 43 PANDA CLOUD BUTTON (7) .................................................................................................... 43 SETTINGS COMPONENTS (8) .................................................................................................... 43 NOTIFICATIONS (9) ................................................................................................................ 44 ACCESS TO THE ADVANCED REPORTING TOOL SERVICE (10) ....................................................... 44 LICENSES ........................................................................................................................45 INTRODUCTION ...............................................................................................................46 CONTRACTING AND RENEWING LICENSES...............................................................................46 LICENSE CONTRACTS .............................................................................................................. 46 PROTECTION STATUS ........................................................................................................48 ASSIGNING AND RELEASING LICENSES ...................................................................................49 LICENSE EXPIRY NOTIFICATIONS ...........................................................................................50 ACCOUNT MANAGEMENT ..............................................................................................51 INTRODUCTION ...............................................................................................................52 DELEGATING ACCOUNT MANAGEMENT .................................................................................52 POSSIBLE ERRORS WHEN DELEGATING ACCOUNT MANAGEMENT .................................................... 53 MERGING ACCOUNTS .......................................................................................................53 CONSEQUENCES OF MERGING ACCOUNTS .................................................................................. 53 REQUIREMENTS FOR MERGING ACCOUNTS ................................................................................. 54 HOW TO MERGE ACCOUNTS .................................................................................................... 54 EFFECTS OF ACCOUNT MERGING ON SERVICE CONFIGURATION ...................................................... 54 POSSIBLE ERROR MESSAGES WHEN MERGING ACCOUNTS ............................................................. 55 USERS ............................................................................................................................56 INTRODUCTION ...............................................................................................................57 CREATING USERS .............................................................................................................57